Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

School of Computer & Information Science

Articles 31 - 60 of 236

Full-Text Articles in Computer Sciences

Automated Database Refresh In Very Large And Highly Replicated Environments, Eric King Aug 2011

Automated Database Refresh In Very Large And Highly Replicated Environments, Eric King

Regis University Student Publications (comprehensive collection)

Refreshing non-production database environments is a fundamental activity. A non-productive environment must closely and approximately be related to the productive system and be populated with accurate, consistent data so that the changes before moving into the production system can be tested more effectively. Also if the development system has more related scenario as that of a live system then programming in-capabilities can be minimized. These scenarios add more pressure to get the system refreshed from the production system frequently. Also many organizations need a proven and performant solution to creating or moving data into their nonproduction environments that will neither …


Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner Aug 2011

Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner

Regis University Student Publications (comprehensive collection)

The turnover rate for information technology professionals in the military is high due to a demand for skilled information technology (IT) professionals in the private sector that value the IT training professionals receive in the military, and which can offer the compensation to lure military personnel to the civilian market. The Department of Defense consistently invests a great deal of time and money into Information Technology trained service members, only to lose them to attractive job positions with civilian companies which are in demand for their specialized skills. With a MOS (mission of service) field that requires a larger monetary …


Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen Aug 2011

Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen

Regis University Student Publications (comprehensive collection)

The elements of a successful Enterprise Resource Planning implementation strategy have been widely researched in the information technology field. Many have sought to compile a complete list of attributes that, if utilized, would guarantee a successful ERP implementation while also adhering to relative time and budget constraints. While several critical success factors have been identified and further enabled higher success rates in evolving ERP implementation strategy, there appears to be room for additional improvement. Extracting essential corporate knowledge from existing information systems in effort to implement an ERP solution is often one of the most challenging tasks of the implementation …


Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart Jul 2011

Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart

Regis University Student Publications (comprehensive collection)

This project focuses on the importance of a computer security policy as a whole. It also looks at how security policies assist in preventing vulnerabilities that may be instigated by employees. Moreover, the project views how the concept of selective enforcement can affect and impact an organization. This project delves into actual cases of employee misconduct in various organizations. It explains how policies were violated and the repercussions of these various misdeeds. Finally the project discusses different items that a good security policy should have and how important it is for policies to be enforced. It is vital that an …


A Fuzzy Logic Stock Trading System Based On Technical Analysis, Sammy Zeigenbein Jun 2011

A Fuzzy Logic Stock Trading System Based On Technical Analysis, Sammy Zeigenbein

Regis University Student Publications (comprehensive collection)

Technical analysis of financial markets involves analyzing past price movements in order to identify favorable trading opportunities. The objective of this research was to demonstrate that a fuzzy logic stock trading system based on technical analysis can assist average traders in becoming successful by optimizing the use of technical indicators and trading rules that experts use to identify when to buy and sell stock. Research of relevant literature explored the current state of knowledge in methodologies for developing and validating trading systems using technical indicators and fuzzy logic trading systems, providing guidelines for the development and evaluation of the system. …


Towards A Traceable Enterprise Architecture For Small- And Medium-Sized Enterprises, Brian R. Houghtaling Jun 2011

Towards A Traceable Enterprise Architecture For Small- And Medium-Sized Enterprises, Brian R. Houghtaling

Regis University Student Publications (comprehensive collection)

The practice of Enterprise Architecture (EA) continues to develop. Many large organizations are using EA processes and practices to help manage their complex set of integrated processes and applications. The set of integrated processes and applications required to meet their unique business requirements. Large organizations inherently recognize that an effective EA assists the enterprise to determine its desired direction. The resulting EA is then used to help manage the changes required to achieve the enterprises chosen destination. In a similar manner, Small- and Medium-Sized Enterprises (SMEs) can benefit from EA practices. Achieving these benefits requires EA practices and tools be …


Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples Jun 2011

Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples

Regis University Student Publications (comprehensive collection)

According to the Payment Card Industry (PCI), over 500 million records containing sensitive cardholder data have been breached since January 2005. Merchants accepting credit and debit cards are at the center of payment card transactions, making it crucial that standard security procedures and technologies are employed to thwart cardholder data theft. Numerous organizations have experienced embarrassing breaches, which lead to losses of credit card data, including Starbucks, California Pizza Kitchen, and TJX Companies. This paper examined an action research methodology to test the security of a network router and remediate all the vulnerabilities that caused it to fail the requirements …


A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons May 2011

A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons

Regis University Student Publications (comprehensive collection)

Geographic information systems instruction at a small community college was deemed inadequate by instructional staff and students. Inadequate resources and inefficient organization of data resulted in frustration for all users. Slow infrastructure resulted in excessive time needed to complete student projects and precluded the course objectives to be fully met. A project was completed to define requirements and recommendations, obtain necessary upgrades to both hardware and network infrastucture, reorganize data storage in a local geodatabase, and institute methods for more efficient instruction using ArcView and ArcCatalog applications from the software suite ArcGIS Desktop by ESRI. Subsequent adoption of the changes …


Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers May 2011

Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers

Regis University Student Publications (comprehensive collection)

Supervisory Control and Data Acquisition (SCADA) systems involve the use of distributed processing to operate geographically dispersed endpoint hardware components. They manage the control networks used to monitor and direct large-scale operations such as utilities and transit systems that are essential to national infrastructure. SCADA industrial control networks (ICNs) have long operated in obscurity and been kept isolated largely through strong physical security. Today, Internet technologies are increasingly being utilized to access control networks, giving rise to a growing concern that they are becoming more vulnerable to attack. Like SCADA, distributed processing is also central to cloud computing or, more …


The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez Apr 2011

The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez

Regis University Student Publications (comprehensive collection)

The paper will examine (through case-study) the usability of open source operating systems software for a combined Honeypot sensor server. The study will scrutinize the use of two Unix variants, Linux Red Hat and the Sun Solaris operating systems as candidates for deployment of a combined Honeypot sensor server. Appropriate unbiased metrics, such as extensibility, reliability, ease of install and use, will be employed as a likely criterion to evaluate the operating systems for the role of hosting Honeypot sensor server software.


A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker Apr 2011

A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker

Regis University Student Publications (comprehensive collection)

The number of women in Information Technology in the United States has historically been lower than the number of men in the field. This study explores the reasons behind this disparity and recommends steps that can be taken to increase the number of women in the field. This qualitative study examines why women are not attracted to the Information Technology field and examines reasons why women leave the field. Surveys were conducted with two populations, (1) women who currently work in Information Technology and (2) Information Technology recruiters. The results of these surveys were analyzed to see if there were …


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …


A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus Apr 2011

A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus

Regis University Student Publications (comprehensive collection)

This study looks at the knowledge management practices used by study participants from the defense industry and offers a methodology for capturing tacit knowledge. Interviews were conducted with stakeholders involved in work teams focused on the development and acquisition of defense systems. Those interviewed held various staff and management positions in Program Management (PM), Enterprise Architecture (EA), and system safety auditing. This researcher conducted primary research in the form of a Case Study. Interviewees in the defense industry supporting the Army, Marine Corps and Military aeronautics were interviewed and asked to provide feedback on their experiences and knowledge of tacit …


Evaluating Best Practices In Document Management, Angela Lokie Apr 2011

Evaluating Best Practices In Document Management, Angela Lokie

Regis University Student Publications (comprehensive collection)

The purpose of this research is to create a knowledgebase of best practices for records managers to select the vendor that best fits the individual needs of the organization. Investigative interviews were conducted with individuals from Association for Information and Image Management (AIIM) and the Project Management Institute (PMI). These project managers were asked questions in regards to the best practices when implementing a document management system. Best practices are relevant when implementing a document management solution. In order to consider best practices when implementing a document management solution, the following research objectives will be taken into consideration: How do …


Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin Apr 2011

Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin

Regis University Student Publications (comprehensive collection)

Current air traffic levels around the world have pushed the enterprise architecture deployed to support air traffic management to the breaking point. Technology limitations prevent expansion of the current solutions to handle rising utilization levels without adopting radically different information delivery approaches. Meanwhile, an architectural transition would present the opportunity to support business and safety requirements that are not currently addressable. The purpose of this research paper is to create a framework for more effectively sharing positioning information utilizing improved air traffic control navigation and communication systems.


Gender Equality With Agile In Software Engineering, Deborah P. Martin Apr 2011

Gender Equality With Agile In Software Engineering, Deborah P. Martin

Regis University Student Publications (comprehensive collection)

Women are under-represented in information technology careers in general and in the profession of software development in particular and their numbers are declining. Previous studies on this topic have investigated whether the reason for this is due to a difference in capability arising out of their gender, or whether the reason arises from social factors. A software development methodology called “Agile†has arisen in recent years which focus on collaboration, working software, and a sustainable workweek. Studies have shown that adopting Agile techniques in the classroom helps to retain women in computer information academic curricula and that adopting them in …


Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl Apr 2011

Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl

Regis University Student Publications (comprehensive collection)

Data is collected from a number of entities within the business environment; it is the essential component that guides the decision making process. Data management is a topic that continues to be discussed as our ability to collect and store data expands. The purpose of this study was to determine whether the data, in the context of the enterprise and its management, was understood allowing best practice data collection and storage policies to be defined. Data collection and storage are tightly coupled in the discussion of storage growth. The literature review showed that a number of data management lifecycles and …


Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright Mar 2011

Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright

Regis University Student Publications (comprehensive collection)

Over the past decade, healthcare organizations have been subjected to many federally mandated statutes to comply with. Three of the biggest statutes over the last decade are the Health Information Portability and Accountability Act (HIPAA), the Red Flag Rules, and the Health Information Technology for Clinical Health (HITECH). These mandates deal directly with the security of electronic patient information. To date, many entities have provided estimations of cost of compliance. Some have provided quantitative models to calculate the return of IT investments. Very few have attempted to look retrospectively and determine the level of and barriers to compliance. This quantitative …


When Is An Enterprise Service Bus (Esb) The Right Choice For An Integrated Technology Solution?, John (Gerry) Burns Feb 2011

When Is An Enterprise Service Bus (Esb) The Right Choice For An Integrated Technology Solution?, John (Gerry) Burns

Regis University Student Publications (comprehensive collection)

The Enterprise Service Bus (ESB) is an important systems integration technology often closely associated with Service Oriented Architecture (SOA). Some maintain that an ESB should not be used apart from SOA. Others see the ESB simply as the next generation of middleware, incorporating the best of its predecessors, Enterprise Application Integration (EAI) and Message Oriented Middleware (MOM), and a candidate for any integration requirement. Is the ESB a one-size-fits-all solution to be trusted for any integration requirement, or must its use be carefully considered with proper due diligence based on application complexity and/or the presence or absence of a defined …


Information Assurance; Small Business And The Basics, William Samuel Fleming Iv Jan 2011

Information Assurance; Small Business And The Basics, William Samuel Fleming Iv

Regis University Student Publications (comprehensive collection)

Business is increasingly dependent on information systems to allow decision makers to gather process and disseminate information. As the information landscape becomes more interconnected, the threats to computing resources also increase. While the Internet has allowed information to flow, it has also exposed businesses to vulnerabilities. Whereas large businesses have information technology (IT) departments to support their security, small businesses are at risk because they lack personnel dedicated to addressing, controlling and evaluating their information security efforts. Further complicating this situation, most small businesses IT capabilities have evolved in an ad hoc fashion where few employees understand the scope of …


Risk Considerations When Determining Network In Infrastructure Upgrade Methodology, Gene Brandt Jan 2011

Risk Considerations When Determining Network In Infrastructure Upgrade Methodology, Gene Brandt

Regis University Student Publications (comprehensive collection)

Risk considerations when determining network infrastructure upgrade methodology have been interesting in areas of cost, time, and path. This paper evolved from a concrete look at upgrading a specific network to a more abstract investigation of the dangers inherent to upgrading large scale networks based on the form the upgrade took. Personal experience had suggested a remove and replace strategy might be most cost effective but planning, scope creep and other factors combined to show risk mitigation is best practiced on a small scale implementation when possible to reduce the consequences of even partial failure. A study of the cost …


Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan Jan 2011

Effecting Data Quality Through Data Governance: A Case Study In The Financial Services Industry, Patrick Egan

Regis University Student Publications (comprehensive collection)

One of the most significant challenges faced by senior management today is implementing a data governance program to ensure that data is an asset to an organization's mission. New legislation aligned with continual regulatory oversight, increasing data volume growth, and the desire to improve data quality for decision making are driving forces behind data governance initiatives. Data governance involves reshaping existing processes and the way people view data along with the information technology required to create a consistent, secure and defined processes for handling the quality of an organization's data. In examining attempts to move towards making data an asset …


Preventing Computer Identity Theft, Donald R. Mcdaniel Dec 2010

Preventing Computer Identity Theft, Donald R. Mcdaniel

Regis University Student Publications (comprehensive collection)

The arrival of the information age has created new challenges to the ability of individuals to protect the security and privacy of their personal information. One such challenge is that of identity theft, which has caused a number of hardships upon its victims. Perpetrators of this fraud may use identities of others to obtain loans, steal money, and violate the law. This paper will discuss the characteristics of the offenders and victims of identity theft. A systematic approach for preventing identity theft will also be presented with the hopes of curtailing this epidemic.


Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall Dec 2010

Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall

Regis University Student Publications (comprehensive collection)

Web applications , especially those based on interpreted programming languages , are quickly becoming more utilized and more commonplace than traditional client applications. Despite this growth, no open solution has yet fulfilled the need of a risk-reducing development framework that supports test-driven methodologies and tools designed to coordinate the resources responsible for the most effective development of web applications based on interpreted programming languages. This research paper presents a test-driven development framework consisting of openly available components that can be used by development teams writing web applications based on interpreted programming languages based on the methodologies and tools used by …


Efficacy Of The United States Safe Harbor Framework, Margaret M. Beck Dec 2010

Efficacy Of The United States Safe Harbor Framework, Margaret M. Beck

Regis University Student Publications (comprehensive collection)

This study assessed the efficacy of the United States Safe Harbor Framework by approximating the size of a population of large United States organizations (50,000 - 500,000 employees) that were eligible to participate in the Safe Harbor that did not participate. The Safe Harbor Framework, administered by the United States Department of Commerce, is a voluntary program that assists United States organizations in complying with the European Union Data Privacy Directive. Out of a population of 337 large organizations, 168 were potentially eligible to participate in the Safe Harbor Framework. One hundred and ten, or 66%, of these organizations did …


Home Computer Security Can Be Improved Using Online Video Streaming Services, Russell Barber Nov 2010

Home Computer Security Can Be Improved Using Online Video Streaming Services, Russell Barber

Regis University Student Publications (comprehensive collection)

Home computer users face many new computer security threats. The rise of the internet has enabled viruses to spread rapidly. Educating computer users on security issues is one way to combat security threats. Video streaming web sites can provide a simple way to distribute educational videos to computer users. This project investigates the effectiveness of creating and distributing computer security educational videos on video streaming sites.


Hospital Network Infrastructure: A Modern Look Into The Network Backbone With Real Time Visibility, Homan Mike Hirad Nov 2010

Hospital Network Infrastructure: A Modern Look Into The Network Backbone With Real Time Visibility, Homan Mike Hirad

Regis University Student Publications (comprehensive collection)

For the purposes of this research, the "design science" discipline of Information Systems will structure the overall methodology and framework for results. By leveraging the design science framework, this study will dissect and analyze various parts of a hospital's network, to uncover substandard practices and problematic weaknesses that commonly result in an overall decrease in the quality of healthcare provided to patients, and negatively affect business operations of hospitals and healthcare facilities. For the purposes of this research the chosen hospital will be categorized as Mid-Western Hospital. This thesis will investigate, in a real world healthcare organization, fault management technologies …


A Clouded Future: Analysis Of Microsoft Windows Azure As A Platform For Hosting E-Science Applications, Ian Blair Nov 2010

A Clouded Future: Analysis Of Microsoft Windows Azure As A Platform For Hosting E-Science Applications, Ian Blair

Regis University Student Publications (comprehensive collection)

Microsoft Windows Azure is Microsoft's cloud based platform for hosting .NET applications. Azure provides a simple, cost effective method for outsourcing application hosting. Windows Azure has caught the eye of researchers in e-science who require parallel computing infrastructures to process mountains of data. Windows Azure offers the same benefits to e-science as it does to other industries. This paper examines the technology behind Azure and analyzes two case studies of e-science projects built on the Windows Azure platform.


A Critical Analysis Of Payload Anomaly-Based Intrusion Detection Systems, Anthony F. Mercurio Oct 2010

A Critical Analysis Of Payload Anomaly-Based Intrusion Detection Systems, Anthony F. Mercurio

Regis University Student Publications (comprehensive collection)

Examining payload content is an important aspect of network security, particularly in today's volatile computing environment. An Intrusion Detection System (IDS) that simply analyzes packet header information cannot adequately secure a network from malicious attacks. The alternative is to perform deep-packet analysis using n-gram language parsing and neural network technology. Self Organizing Map (SOM), PAYL over Self-Organizing Maps for Intrusion Detection (POSEIDON), Anomalous Payload-based Network Intrusion Detection (PAYL), and Anagram are next-generation unsupervised payload anomaly-based IDSs. This study examines the efficacy of each system using the design-science research methodology. A collection of quantitative data and qualitative features exposes their strengths …


Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez Oct 2010

Leveraging Information Technology Within A Roman Catholic Diocese, Sidney K. Rodriguez

Regis University Student Publications (comprehensive collection)

Parishes within the Roman Catholic Church face many of the same concerns as any other non-profit organization. Dependencies on donations and volunteer help restrict the parish to leverage technology to gain efficiencies. Parishes have an additional concern. Although grouped under a Diocese, this hierarchical structure is not a standard, top-down directive organization. A Roman Catholic Diocese is a "subsidiarity". Decisions are made at the lowest level, specifically; decisions on how to operate and administer the parish are given to the pastor or parish director of that parish. Acknowledging that leveraging technology is a way to gain efficiencies, the ability to …